Education background
Bachelor of Mathematics, Lanzhou University, Lanzhou, China, 1987;
Ph.D. in Applied Mathematics, Sichuan University, Chengdu, China, 2001.
Social service
Key Lab of Copyright Protection and Applications, State Administration of Press Publication, Radio, Film and Television of The Reople’s Republic of China, Tsinghua University: Director (2016-);
Areas of Research Interests/ Research Projects
Encryption Algorithms, Video Intelligent Behavior Analysis, Security of Digital Multimedia and Security Forensics, Information Hiding and Digital Watermarking, Anti-Counterfeiting Technology.
National Natural Science Foundation of China: Research on Key Problems of Visual Cryptography Scheme (2004-2006);
National Natural Science Foundation of China: Constructing Relationship Model of Linear Threshold Scheme and Visual Secret Sharing Scheme, and Research on Some Problems of the Two Schemes (2009-2011);
National 863 High-Tech Program: Multi-Layer Visual Anti-Counterfeit Technology for Images (2008-2010);
National Natural Science Foundation of China: Research on optimal visual secret sharing schemes and their applications (2012-2015).
National Natural Science Foundation of China: How to evaluate moiré patterns and construct specified moiré patterns based on visual cryptography (2014-2017).
NSFC- Joint Fund for Basic Technology Research : Research on Key Problems of secret sharing schemes in social network (2016-2018)
Honors And Awards
Ministry of Education, The People's Republic of China, Award for Technological Invention, First Class (2015);
Science and Technology Award by China Electronic Science and technology, First Class (2015).
Academic Achievement
List of Papers Published in Partial Journals (From 2007 to Now)
[1] X.X. Jia, D.S. Wang,D.X Nie, X.Y. Luo, J.Z. Sun, A new threshold changeable secret sharing scheme based on the Chinese Remainder Theorem. Information Sciences, vol.473, pp.13-30, 2019.
[2] H.P. Peng, Y.Tian, J. Kurths, L.X. Li, Y.X. Yang, D.S. Wang, Secure and energy-efficient data transmission system based on chaotic compressive sensing in body to body networks, IEEE Transactions on Biomedical Circuits and Systems, vol.11(3), pp.558-573, 2017.
[3]X.X. Jia, D.S. Wang, D.X. Nie, C,Y. Zhang, Collaborative visual cryptographic schemes. IEEE Transactions on Circuits and Systems for Video Technology,vol.11(21), pp.1056-1070, 2016
[4]L.M. Gong, S.D. Li, Q. Mao,D.S. Wang, J.W. Dou,A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle, Theoretical Computer Science, vol. 609, pp.253-261, 2016.
[5] C.N. Yang, D.S. Wang. Property analysis of xor based visual cryptography, IEEE Transactions on Circuits and Systems for Video Technology, vol. 24(2), pp.189-197, 2014.
[6] S.D. Li, C.Y. Wu, D.S. Wang, Y.Q. Dai, Secure multiparty computation of solid geometric problems and their applications, Information Sciences, vol. 282, pp. 401-413, 2014.
[7] C.N. Yang, C. C. Wu, D.S. Wang, A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences, vol.278(10), pp.141-173, 2014.
[8] D.S. Wang, T. Song, L. Dong, C.N. Yang , Optimal contrast grayscale visual cryptography schemes with reversing, IEEE Transaction on Information Forensics and Security, vol. 8(12), pp.2059-2072, 2013.
[9] D.S. Wang, L. Dong, X. Li. Towards shift tolerant visual secret sharing schemes, IEEE Transactions on Information Forensics and Security, vol.6 (2), pp.323-337, 2011.
[10] D.S. Wang, F. Yi, X. Li, Probabilistic visual secret sharing schemes for gray-scale images and color images, Information Sciences, vol.181(11), pp.2189-2208, 2011.